[Full-disclosure] cryptsetup can't destroy last key of a LUKS partition under Ubuntu/Debian
- From: Pierre Dinh-van <pierre@xxxxxxxx>
- Date: Fri, 13 Feb 2009 09:24:52 +0100
I noticed last week that the Debian packaged version of cryptsetup has a
little limitation, which could be a security issue for people who have to
destroy their data forever.
It is impossible to destroy a keyslot when you used it to unlock the master
I reported the bug to debian (etch and lenny are affected as far as I tested):
and to ubuntu (tested on hardy):
It's not a major security problem, but people who were planning to run
'cryptsetup luksDelKey /dev/sda1 0' on their installation when the police
comes to wake them up should be adviced that it won't work out of the box.
Description: Digital signature
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/
- Prev by Date: [Full-disclosure] ICQ 6 protocol bug?
- Next by Date: Re: [Full-disclosure] Facebook from a hackers perspective
- Previous by thread: [Full-disclosure] ICQ 6 protocol bug?
- Next by thread: [Full-disclosure] Facebook is the awesomest